BASIT SHAFIQ

Associate Professor

Department of Computer Science
Lahore University of Management Sciences
 
 

Address

School of Science and Engineering
Lahore University of Management Sciences
DHA, Lahore Cantt. 54792
Phone: +92 42 3560-8366
Email: basit at lums dot edu dot pk

Education

PhD, Purdue University, 2002 - 2006
MS, Purdue University, 1999 - 2001
BS, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, 1995 - 1999

Areas of Interest

Security and Privacy, Access Control, Distributed Systems, Web Services, Semantic Web

Curriculum Vitae

(pdf)

Publications

Book Chapters

  1. H. Irshad, B. Shafiq, J. Vaidya , M. A. Bashir, H. S. Asif, S. Ghayyur, S. Shamail, and N. Adam, "A Privacy-Sensitive Collaborative Approach to Business Process Development," Mohammad S. Obaidat and Pascal Lorenz (eds.), E-Business and Telecommunications, Communications in Computer and Information Science Series, Springer, 2016.
  2. N. Adam, H. Lu, J. Vaidya, and B. Shafiq, "Statistical Databases," Henk C.A. van Tilborg & Sushil Jajodia (eds.), Encyclopedia of Cryptography and Security, Springer, 2011.
  3. W. Sheikh, B. Shafiq, and A. Ghafoor, "A QoS Framework for Multimedia Applications in a Mobile Ad Hoc Network," IEC Comprehensive Report on broadband Services, Applications, and networks: Enabling technologies and Business Models (Summer 2004).

Journal Papers

  1. B. Shafiq, S. Ghayyur, A. Masood, Z. Pervaiz, A. Almutairi, F. Khan, and A. Ghafoor, "Composability Verification of Multi-service Workflows in a Policy-Driven Cloud Computing Environment," accepted for publication in IEEE Transactions on Dependable and Secure Computing.
  2. D. Lorenzi, S. Chun, J. Vaidya, B. Shafiq, V. Atluri, and N. Adam, "PEER: A Framework for Public Engagement in Emergency Response," International Journal of E-Planning Research (IJEPR), Vol. 4, No. 3 (2015): 29-46.
  3. J. Vaidya, B. Shafiq, W. Fan, D. Mehmood, and D. Lorenzi ,"A Random Decision Tree Framework for Privacy-preserving Data Minning," IEEE Transactions on Dependable and Secure Computing, Vol.11, No.5, pp.399,411, Sept.-Oct. 2014.
  4. D. Lorenzi, J. Vaidya, S. Chun, B. Shafiq, and V. Atluri,"Enhancing the Government Service Experience through QR Codes on Mobile Platforms," Government Information Quarterly, Volume 31, Issue 1, January 2014, Pages 6 - 16.
  5. N. Adam and B. Shafiq, "Spatial Computing and Social Media in the Context of Disaster Management," IEEE Intelligent Systems, Nov/Dec 2012.
  6. X. He, J. Vaidya, B. Shafiq, N. Adam, and V. Atluri, "Structure-Aware Graph Anonymization," Web Intelligence and Agent Systems, (2), pp. 193 - 208, April, 2012, IOS Press, NL.
  7. B. Shafiq, V. Atluri, J. Vaidya, S. Chun, and G. Nabi, "Resource Sharing using UICDS Framework for Incident Management," Transforming Government: People, Process and Policy, 6(1), pp. 41 - 61, 2012.
  8. A. Paliwal, B. Shafiq, J. Vaidya, H. Xiong, and N. Adam, "Semantics Based Automated Service Discovery," IEEE Transactions on Services Computing, April 2012.
  9. X. He, J. Vaidya, B. Shafiq, N. Adam, and T. White, "Privacy Preserving Integration of Health Care Data," International Journal of Computational Models and Algorithms in Medicine, 1(2), special issue on Privacy and Security Issues for Medical Data, pp. 22-36, 2010, IGI Global.
  10. W. Sheikh, B. Shafiq, S. Baqai, R. A. Paul, M. F. Khan, and H. Ghafoor, "A QoS Framework for Multimedia Applications in Mobile Ad Hoc Networks," International Journal of Computer Systems Science and Engineering, Vol. 22, No.3, 2007.
  11. B. Shafiq , J. Joshi, E. Bertino, and A. Ghafoor, "Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies," IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 11, November 2005, pp. 1557-1577.
  12. R. Bhatti, B. Shafiq, J. Joshi, E. Bertino, and A. Ghafoor, "X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control," ACM Transactions on Information and System Security, Vol. 8, No. 4, pp. 388-423.
  13. R. Bhatti, B. Shafiq, M. Shehab, and A. Ghafoor, "Distributed Access Management in Multimedia IDCs," IEEE Computer, Vol. 38, No. 9, September 2005, pp. 60-69.
  14. B. Shafiq, H. Fahmi, S. Baqai, A. Khokhar, and A.Ghafoor, "Wireless Network Resource Management for Web-Based Multimedia Document Services," IEEE Communication Magazine, Vol. 41, No. 3, March 2003, pp. 138-145.
  15. J. Joshi, K. Li, H. Fahmi, B. Shafiq, and A. Ghafoor, "A Model for Secure Multimedia Document Database System in a Distributed Environment," IEEE Transactions on Multimedia, Vol. 4, No. 2, June 2002, pp. 215-234.
  16. H. Fahmi, W. G. Aref, M. Latif, B. Shafiq, A. Ghafoor, P. Liu, and L. Hsu, "Distributed Web-based Framework for Real-time Multimedia Object Communication," International Journal of Computer Systems Science and Engineering, Vol. 16, No. 2, March 2001.

Conference and Workshop Papers

  1. J. Vaidya, B. Shafiq, V. Atluri, and D. Lorenzi, "A framework for policy similarity evaluation and migration based on change detection," accepted for publication in the 9th International Conference on Network and System Security, November 2015.
  2. H. Irshaad, B. Shafiq, J. Vaidya, S. Shamail, and N. Adam, "Preserving Privacy in Collaborative Business Process Composition," 12th International Conference on Security and Cryptography (SECRYPT 2015), Colmar, France, 20-22 July 2015. (won best paper ward)
  3. D. Lorenzi, J. Vaidya, B. Shafiq, S. Chun, N. Vegesna, Z. Alzamil, N. Adam, S. Werner, and V. Atluri, "Utilizing Social Media to Improve Local Government Responsiveness," 15th International Digital Government Research Conference (dg.o 2014).
  4. J. Vaidya, A. Basu, B. Shafiq, and Yuan Hong, "Differentially Private Naive Bayes Classification," Proceedings of the 2013 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2013), 17-20 November 2013, Atlanta, GA, USA.
  5. J. Vaidya, B. Shafiq, D. Lorenzi, and N. Badar. "Incorporating Privacy into the Undergraduate Curriculum," In Proceedings of the 2013 Information Security Curriculum Development Conference (InfoSecCD'13), ACM, 2013.
  6. D. Lorenzi, J. Vaidya, S. Chun, B. Shafiq, V. Naik, V. Atluri, and N. Adam, "Community Based Emergency Response," in Proceedings of the 14th Annual International Conference on Digital Government Research (dg.o'13), Laval University, Quebec City, Quebec, Canada.
  7. J. Vaidya, B. Shafiq, X. Jiang, and L. Ohno-Machado, "Identifying Inference Attacks against Healthcare Data Repositories," AMIA Summit on Clinical Research Informatics (CRI), March 20-22, 2013 San Francisco, USA.
  8. N. Badar, J. Vaidya, V. Atluri, and B. Shafiq, "Risk based Access Control using Classification," in Proceedings of the 5th Symposium on Configuration Analytics and Automation (SafeConfig 2012), October 3 - 4, 2012, Baltimore, MD, USA.
  9. B. Shafiq, J. Vaidya, S. Chun, N. Badar, and N. Adam, "Secure Composition of Cascaded Web Services," in Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012), October 14-17, 2012 Pittsburgh, Pennsylvania, USA.
  10. X. He, J. Vaidya, B. Shafiq, and N. Adam, "Privacy Preserving Maximum-Flow Computation in Distributed Graphs," in Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2012). Amsterdam, Netherlands. September 2012.
  11. D. Mehmood, B. Shafiq, J. Vaidya, Y. Hong, N. Adam, and V. Atluri, "Privacy-preserving Subgraph Discovery," in Proceedings of the 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), July 11-13, 2012, Institut Mines-Telecom, Paris, France.
  12. B. Shafiq, J. Vaidya, A. Ghafoor, E. Bertino, "A Framework for Verification and Optimal Reconfiguration of Event-driven Role Based Access Control Policies," in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, USA, 2012.
  13. D. Lorenzi, J. Vaidya, S. Chun, B. Shafiq, G. Nabi, V. Atluri, "Using QR Codes for Enhancing the Scope of Digital Government Services," in Proceedings of the 13th Annual International Conference on Digital Government Research (dg.o 2012).
  14. Y. Hong, J. Vaidya, H. Lu, and B. Shafiq, "Privacy-preserving Tabu Search for Distributed Graph Coloring," in Proceedings of the IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT '11), October 9-11, 2011, MIT, Boston, USA.
  15. V. Atluri, B. Shafiq, S. Chun, G. Nabi, and J. Vaidya, "UICDS-based Information Sharing among Emergency Response Application Systems," in Proceedings of the 12th Annual International Conference on Digital Government Research (dg.o 2011), June 12-15 2011, University of Maryland, College Park, MD, USA. (Demo Paper - Best Demo or Poster Award).
  16. X. He, J. Vaidya, B. Shafiq, N. Adam, and X. Lin, "Reachability Analysis in Privacy-Preserving Perturbed Graphs," Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
  17. J. Vaidya, V. Atluri, B. Shafiq, and N. Adam, "Privacy-preserving Trust Verification," ACM Symposium on Access Control Models and Technologies , 2010.
  18. V. Atluri, B. Shafiq, J. Vaidya, S. Chun, M. Trocchia, N. Adam, C. Doyle and L. Skelly, "Information Sharing Infrastructure for Pharmaceutical Supply Chain Management in Emergency Response," in Proceedings of the 2010 IEEE International Conference on Technologies for Homeland Security, 8-10 November 2010, Westin Hotel, Waltham, MA.
  19. B. Shafiq, J. Vaidya, V. Atluri, and S. Chun, "UICDS Compliant Resource Management System for Emergency Response," 11th International Digital Government Research Conference (dg.o 2010).
  20. V. Atluri,S. Chun, J. Ellenberger, B. Shafiq, and J. Vaidya, "Integrated Resource and Logistics Management through Secure Information Sharing for Effective Emergency Response," Workshop on Emergency Management: Incident, Resource, and Supply Chain Management (EMWS09), November 5-6, 2009.
  21. X.He, J. Vaidya, B. Shafiq, N. Adam, and V. Atluri, "Preserving Privacy in Social Networks: A Structure-Aware Approach," in Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, pp.647-654, 15-18 Sept. 2009.
  22. X. He, J. Vaidya, B. Shafiq, and N. Adam, "Efficient Privacy-Preserving Link Discovery," 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD-09).
  23. B. Shafiq, J. Vaidya, V. Atluri, N.Adam, S. Chun, and A. Lieb, "Ontology Driven Resource Management for Emergency Response," Proceedings of the Workshop on Secure Knowledge Management November 3-4, 2008.
  24. X. He, B. Shafiq, J. Vaidya, and N. Adam, "Privacy-Preserving Link Discovery," in Proceedings of the 23rd Annual ACM Symposium on Applied Computing, Data Mining Track , March 16-20,2008, Fortaleza, Ceara, Brazil.
  25. N. Adam, V. Atluri, S. Chun, J.Ellenberger, B. Shafiq, J. Vaidya, and H. Xiong, "Secure Information Sharing and Analysis for Effective Emergency Management," in Proceedings of the 9th Annual International Conference on Digital Government Research, Montreal, Canada, May 2008.
  26. N. Adam, T. White, B. Shafiq, and J. Vaidya, "Privacy Preserving Integration of Health Care Data," AMIA 2007 Annual Symposium .
  27. A. Paliwal, N. Adam and B. Shafiq, "Policy based Web Service Orchestration and Goal Reachability Analysis using HMSC and CP Nets," in Proceedings of 9th IEEE Conference on E-Commerce Technology (CEC' 07) and the 4th IEEE Conference on Enterprise Computing, E-Commerce and E-Services (EEE ' 07) , July 2007.
  28. N. Adam, V. Janeja, A.Paliwal, B. Shafiq, C. Ulmer, V. Gersabeck, A. Hardy, C. Bornhoevd, and J. Schaper, "An Approach for discovering and handling crisis in a service-oriented environment," in Proceedings of the IEEE International Conference on Intelligence and Security Informatics 2007 (ISI 2007), May 2007.
  29. N. Adam, A. Kozanoglu, A. Paliwal, and B. Shafiq, "Secure Information Sharing in a Virtual Multi-agency Team Environment," in Proceedings of the Second International Workshop on Security and Trust Management (STM'06), Hamburg, Germany, September 2006.
  30. B. Shafiq, A. Samuel, E. Bertino, and A. Ghafoor, "Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints," in Proceedings of the IEEE International Conference on Data Engineering, Atlanta, GA, April 2006, (short paper).
  31. B. Shafiq, A. Samuel, and H. Ghafoor, "A GTRBAC Based System for Dynamic Workflow Composition and Management," in Proceedings of the IEEE International Symposium on Object Oriented Real-time Distributed Computing (ISORC'05), Seattle, WA, May 2005.
  32. B. Shafiq, E. Bertino, and A. Ghafoor, "Access Control Management in a Distributed Environment Supporting Dynamic Collaboration," in Proceedings of the ACM Workshop on Digital Identity Management, Fairfax VA, November 2005.
  33. B. Shafiq, A. Masood, J. Joshi, and A. Ghafoor, "A Role-based Access Control Policy Verification Framework for Real-Time Systems," in Proceedings of the IEEE International Workshop on Object-oriented Real-Time Dependable Systems, Sedona AZ, February 2005.
  34. W. Sheikh, B. Shafiq, R. Paul, and A. Ghafoor, "Provision of Multimedia Services in a Mobile Ad Hoc Network," in Proceedings of the IEEE International Workshop on Object-oriented Real-Time Dependable Systems , October 2003, pp. 87-93.
  35. J. Joshi, E. Bertino, B. Shafiq, and A. Ghafoor, "Dependencies and separation of Duty Constraints in GTRBAC", Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT'03), Como, Italy, June 2-3, 2003.
  36. H. Fahmi, M. Latif, B. shafiq, R. Paul, and A. Ghafoor, "Real-time Resource Reservation for Synchronized Multimedia Object over Wireless LAN," in Proceedings of the IEEE International Symposium on Object Oriented Real-time Distributed Computing. (ISORC'02), April 29 - May 1, 2002, Washington DC.